SlideShare a Scribd company logo
CRYPTOGRAPHY & NETWORK
SECURITY- Cryptographic Hash
Functions
Dr R Jegadeesan Prof-CSE
Jyothishmathi Institute of Technology and Science,
karimnagar
Cryptographic Hash Functions
Syllabus
➢UNIT – III: Cryptographic Hash Functions: Message Authentication, Secure
Hash Algorithm (SHA-512), Message authentication codes: Authentication
requirements, HMAC, CMAC, Digital signatures, Elgamal Digital Signature
Scheme. Key Management and Distribution: Symmetric Key Distribution Using
Symmetric & Asymmetric Encryption, Distribution of Public Keys, Kerberos,
X.509 Authentication Service, Public – Key Infrastructure
Security Introduction
2
Cryptographic Hash Functions
Aim & Objective :
➢ Our focus is on Internet Security
➢ Consists of message authentication code
➢UNIT – III: Cryptographic Hash Functions: Message Authentication, Secure
Hash Algorithm (SHA-512), Message authentication codes: Authentication
requirements, HMAC, CMAC, Digital signatures, Elgamal Digital Signature
Scheme. Key Management and Distribution: Symmetric Key Distribution Using
Symmetric & Asymmetric Encryption, Distribution of Public Keys, Kerberos,
X.509 Authentication Service, Public – Key Infrastructure
Security Introduction
3
Cryptographic Hash Functions
Message Authentication
It is a mechanism or service used to verify the
integrity of a message.
Procedure to verify that
- Received message is from alleged source.
- Message has not been altered.
- There is no change in message sequence.
- Message is not delayed or a replay.
Cryptographic Hash Functions
Cryptographic Hash Functions
Cryptographic Hash Functions
Message Authentication Functions
• Any message authentication or digital signature
mechanism has two levels of functionality.
• At the lower level, there must be some sort of
function that produces an authenticator: a value to
be used to authenticate a message.
• This lower-level function is then used as a primitive
in a higher-level authentication protocol that
enables a receiver to verify the authenticity of a
message.
Cryptographic Hash Functions
Types of Message Authentication Functions
The types of functions that may be used to produce an
authenticator.
These may be grouped into three classes.
• Message encryption: The cipher text of the entire
message serves as its authenticator.
• Message authentication code (MAC): A function of
the message and a secret key that produces a fixed-
length value that serves as the authenticator.
• Hash function: A function that maps a message of
any length into a fixed length hash value, which
serves as the authenticator.
Cryptographic Hash Functions
Cryptographic Hash Functions
Cryptographic Hash Functions
Cryptographic Hash Functions
Cryptographic Hash Functions
Cryptographic Hash Functions
Cryptographic Hash Functions
Cryptographic Hash Functions
Cryptographic Hash Functions
Cryptographic Hash Functions
Cryptographic Hash Functions
Cryptographic Hash Functions
Cryptographic Hash Functions
Cryptographic Hash Functions
Hash Function courses
23
courses available on <www.coursera.org>, and http://neat.aicte-india.org
https://www.coursera.org/
Course 1 : Introduction to Cyber Security
Cyber Security. An introduction to modern information and system protection technology and methods.
Course 2: Cyber security Specialization
-Cyber security Fundamentals. Construction of Secure Systems
Cryptographic Hash Functions
Security Tutorials
24
Tutorial topic wise
➢Cryptography Tutorial – Tutorialspoint www.tutorialspoint.com › cryptography
➢Cryptography Introduction – GeeksforGeeks www.geeksforgeeks.org › cryptography-introduction
➢www.cse.iitm.ac.in › ~chester › courses › slides › 01_Introduction
Cryptographic Hash Functions
Network Security MCQs
25
CNS – MCQs
1.ECB stands for
a. Electronic Control Book b. Electronic Code Book
c. Electronic Cipher Book d. Electronic Cryptography Book
2.The process of transforming plain text to unreadable text.
a. Decryption b. Encryption
c. Network Security d. Information Hiding
3.Plain text is the data after encryption is performed.
a. True b. False c. May be d. Can't say
4.Study of creating a d using encryption and decryption techniques.
a. Cipher b. Cryptography
b. c. Encryption d. Decryption
5. An attack in which the user receives unwanted amount of e-mails.
a. Smurfing b. Denial of service
c. E-mail bombing d. Ping storm
Cryptographic Hash Functions
Security Tutorial
26
CNS –Tutorial Problems:
❑There are many businesses that don’t have a complete inventory of all of the IT assets that they have tied into
their network. This is a massive problem. If you don’t know what all of the assets are on your network, how can
you be sure your network is secure?
❑Many businesses are concerned with “zero day” exploits. These exploits are those unknown issues with security in
programs and systems that have yet to be used against anyone. However, zero day vulnerabilities aren’t the
problem—unpatched known vulnerabilities are the problem.
Cryptographic Hash Functions
CNS Questions
27
Universities & Important Questions:
1. Differentiate MAC and Hash function.
2. Define hash function.
3. What is a Message Authentication Code (MAC)?
4. Define weak-collision resistance.
5. Define strong-collision resistance
6. Define digital Signature.
7. What is the difference between direct and arbitrated digital signature?
8. What is the role of a Key Distribution Centre (KDC) for user authentication?
9. What is the role of a nonce while using an authentication protocol?
10. What is called public key certificate?
Cryptographic Hash Functions
28
Thank you

More Related Content

PPT
Router and Routing Protocol Attacks
PPTX
Google App Engine
PPTX
System protection in Operating System
PPTX
Trusted systems
PPTX
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
PPTX
Grid computing Seminar PPT
PPT
REVIEW PAPER on Scheduling in Cloud Computing
PPTX
Pgp pretty good privacy
Router and Routing Protocol Attacks
Google App Engine
System protection in Operating System
Trusted systems
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
Grid computing Seminar PPT
REVIEW PAPER on Scheduling in Cloud Computing
Pgp pretty good privacy

What's hot (20)

PPTX
5. message authentication and hash function
PPTX
Cryptography on cloud
PDF
IPSec (Internet Protocol Security) - PART 1
PPTX
Cryptography
PPT
Network Security and Cryptography
PPTX
Multicastingand multicast routing protocols
PPT
Type Checking(Compiler Design) #ShareThisIfYouLike
PPTX
Mathematical Analysis of Non-Recursive Algorithm.
PPTX
Introdution and designing a learning system
PDF
Symbol table in compiler Design
PPTX
Python libraries for data science
PPTX
Python for IoT
PPTX
Data Encryption Standard (DES)
PPTX
IP Security
PDF
IoT with Python
PPT
4 greedy methodnew
PDF
Remote Procedure Call (RPC) Server creation semantics &amp; call semantics
PPT
HMAC&CMAC.ppt
PPTX
Adbms 43 multiversion concurrency control
PDF
Iot projects 2021-2022
5. message authentication and hash function
Cryptography on cloud
IPSec (Internet Protocol Security) - PART 1
Cryptography
Network Security and Cryptography
Multicastingand multicast routing protocols
Type Checking(Compiler Design) #ShareThisIfYouLike
Mathematical Analysis of Non-Recursive Algorithm.
Introdution and designing a learning system
Symbol table in compiler Design
Python libraries for data science
Python for IoT
Data Encryption Standard (DES)
IP Security
IoT with Python
4 greedy methodnew
Remote Procedure Call (RPC) Server creation semantics &amp; call semantics
HMAC&CMAC.ppt
Adbms 43 multiversion concurrency control
Iot projects 2021-2022
Ad

Similar to CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions (20)

PPT
Message authentication and hash function
PDF
An Efficient privacy preserving for Mobile and Pervasive Computing
DOCX
efficient authentication for mobile and pervasive computing
PPT
Information and data security cryptography and network security
PDF
Information Security Imp +Past Paper.pdf
PPTX
unit - III.pptx
PPTX
Efficient authentication for mobile and pervasive computing
PDF
Comptia Security+ Exam Notes
PPTX
cryptography and network security cns.pptx
PDF
Unit 3_Hash function and MD5 working.pdf
PPTX
Efficient authentication for mobile and pervasive computing
DOCX
JPJ1449 Efficient Authentication for Mobile and Pervasive Computing
DOCX
Efficient authentication for mobile and pervasive computing
PDF
Iaetsd a survey on cloud storage security with
PDF
The Time-Consuming Task Of Preparing A Data Set For...
PPTX
Information and network security 41 message authentication code
PPTX
Project_PresentationPPT.pptx final year project
PDF
IRJET - Hash Functions and its Security for Snags
PPT
Cryptographysecurity 1222867498937700-9
PPTX
Cyber security workshop talk.pptx
Message authentication and hash function
An Efficient privacy preserving for Mobile and Pervasive Computing
efficient authentication for mobile and pervasive computing
Information and data security cryptography and network security
Information Security Imp +Past Paper.pdf
unit - III.pptx
Efficient authentication for mobile and pervasive computing
Comptia Security+ Exam Notes
cryptography and network security cns.pptx
Unit 3_Hash function and MD5 working.pdf
Efficient authentication for mobile and pervasive computing
JPJ1449 Efficient Authentication for Mobile and Pervasive Computing
Efficient authentication for mobile and pervasive computing
Iaetsd a survey on cloud storage security with
The Time-Consuming Task Of Preparing A Data Set For...
Information and network security 41 message authentication code
Project_PresentationPPT.pptx final year project
IRJET - Hash Functions and its Security for Snags
Cryptographysecurity 1222867498937700-9
Cyber security workshop talk.pptx
Ad

More from Jyothishmathi Institute of Technology and Science Karimnagar (20)

PDF
JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
PDF
JAVA PROGRAMMING - The Collections Framework
PDF
JAVA PROGRAMMING- Exception handling - Multithreading
PDF
JAVA PROGRAMMING – Packages - Stream based I/O
PDF
Java programming -Object-Oriented Thinking- Inheritance
PDF
Compiler Design- Machine Independent Optimizations
PDF
PDF
COMPILER DESIGN- Syntax Directed Translation
PDF
COMPILER DESIGN- Introduction & Lexical Analysis:
PPTX
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
PDF
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
PDF
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
PDF
Computer Forensics Working with Windows and DOS Systems
JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
JAVA PROGRAMMING - The Collections Framework
JAVA PROGRAMMING- Exception handling - Multithreading
JAVA PROGRAMMING – Packages - Stream based I/O
Java programming -Object-Oriented Thinking- Inheritance
Compiler Design- Machine Independent Optimizations
COMPILER DESIGN- Syntax Directed Translation
COMPILER DESIGN- Introduction & Lexical Analysis:
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
Computer Forensics Working with Windows and DOS Systems

Recently uploaded (20)

PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Approach and Philosophy of On baking technology
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Encapsulation theory and applications.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Empathic Computing: Creating Shared Understanding
PDF
MIND Revenue Release Quarter 2 2025 Press Release
20250228 LYD VKU AI Blended-Learning.pptx
Approach and Philosophy of On baking technology
NewMind AI Weekly Chronicles - August'25-Week II
Encapsulation_ Review paper, used for researhc scholars
Unlocking AI with Model Context Protocol (MCP)
gpt5_lecture_notes_comprehensive_20250812015547.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Big Data Technologies - Introduction.pptx
Encapsulation theory and applications.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
MYSQL Presentation for SQL database connectivity
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
The Rise and Fall of 3GPP – Time for a Sabbatical?
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Spectral efficient network and resource selection model in 5G networks
Empathic Computing: Creating Shared Understanding
MIND Revenue Release Quarter 2 2025 Press Release

CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions

  • 1. CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions Dr R Jegadeesan Prof-CSE Jyothishmathi Institute of Technology and Science, karimnagar
  • 2. Cryptographic Hash Functions Syllabus ➢UNIT – III: Cryptographic Hash Functions: Message Authentication, Secure Hash Algorithm (SHA-512), Message authentication codes: Authentication requirements, HMAC, CMAC, Digital signatures, Elgamal Digital Signature Scheme. Key Management and Distribution: Symmetric Key Distribution Using Symmetric & Asymmetric Encryption, Distribution of Public Keys, Kerberos, X.509 Authentication Service, Public – Key Infrastructure Security Introduction 2
  • 3. Cryptographic Hash Functions Aim & Objective : ➢ Our focus is on Internet Security ➢ Consists of message authentication code ➢UNIT – III: Cryptographic Hash Functions: Message Authentication, Secure Hash Algorithm (SHA-512), Message authentication codes: Authentication requirements, HMAC, CMAC, Digital signatures, Elgamal Digital Signature Scheme. Key Management and Distribution: Symmetric Key Distribution Using Symmetric & Asymmetric Encryption, Distribution of Public Keys, Kerberos, X.509 Authentication Service, Public – Key Infrastructure Security Introduction 3
  • 5. Message Authentication It is a mechanism or service used to verify the integrity of a message. Procedure to verify that - Received message is from alleged source. - Message has not been altered. - There is no change in message sequence. - Message is not delayed or a replay. Cryptographic Hash Functions
  • 8. Message Authentication Functions • Any message authentication or digital signature mechanism has two levels of functionality. • At the lower level, there must be some sort of function that produces an authenticator: a value to be used to authenticate a message. • This lower-level function is then used as a primitive in a higher-level authentication protocol that enables a receiver to verify the authenticity of a message. Cryptographic Hash Functions
  • 9. Types of Message Authentication Functions The types of functions that may be used to produce an authenticator. These may be grouped into three classes. • Message encryption: The cipher text of the entire message serves as its authenticator. • Message authentication code (MAC): A function of the message and a secret key that produces a fixed- length value that serves as the authenticator. • Hash function: A function that maps a message of any length into a fixed length hash value, which serves as the authenticator. Cryptographic Hash Functions
  • 23. Hash Function courses 23 courses available on <www.coursera.org>, and http://neat.aicte-india.org https://www.coursera.org/ Course 1 : Introduction to Cyber Security Cyber Security. An introduction to modern information and system protection technology and methods. Course 2: Cyber security Specialization -Cyber security Fundamentals. Construction of Secure Systems Cryptographic Hash Functions
  • 24. Security Tutorials 24 Tutorial topic wise ➢Cryptography Tutorial – Tutorialspoint www.tutorialspoint.com › cryptography ➢Cryptography Introduction – GeeksforGeeks www.geeksforgeeks.org › cryptography-introduction ➢www.cse.iitm.ac.in › ~chester › courses › slides › 01_Introduction Cryptographic Hash Functions
  • 25. Network Security MCQs 25 CNS – MCQs 1.ECB stands for a. Electronic Control Book b. Electronic Code Book c. Electronic Cipher Book d. Electronic Cryptography Book 2.The process of transforming plain text to unreadable text. a. Decryption b. Encryption c. Network Security d. Information Hiding 3.Plain text is the data after encryption is performed. a. True b. False c. May be d. Can't say 4.Study of creating a d using encryption and decryption techniques. a. Cipher b. Cryptography b. c. Encryption d. Decryption 5. An attack in which the user receives unwanted amount of e-mails. a. Smurfing b. Denial of service c. E-mail bombing d. Ping storm Cryptographic Hash Functions
  • 26. Security Tutorial 26 CNS –Tutorial Problems: ❑There are many businesses that don’t have a complete inventory of all of the IT assets that they have tied into their network. This is a massive problem. If you don’t know what all of the assets are on your network, how can you be sure your network is secure? ❑Many businesses are concerned with “zero day” exploits. These exploits are those unknown issues with security in programs and systems that have yet to be used against anyone. However, zero day vulnerabilities aren’t the problem—unpatched known vulnerabilities are the problem. Cryptographic Hash Functions
  • 27. CNS Questions 27 Universities & Important Questions: 1. Differentiate MAC and Hash function. 2. Define hash function. 3. What is a Message Authentication Code (MAC)? 4. Define weak-collision resistance. 5. Define strong-collision resistance 6. Define digital Signature. 7. What is the difference between direct and arbitrated digital signature? 8. What is the role of a Key Distribution Centre (KDC) for user authentication? 9. What is the role of a nonce while using an authentication protocol? 10. What is called public key certificate? Cryptographic Hash Functions